Key Takeaways
- In Verizon DBIR, 61% of breaches involved stolen credentials or credential-related attacks, which are often harvested through URL-based phishing
- In Google’s Transparency Report, the number of Safe Browsing-related removals and user protections scale globally across billions of URLs processed
- In a study of phishing URL features, models using lexical and host-based features achieved high detection rates (e.g., >90% in benchmark settings), supporting the measurable distinguishability of malicious URLs
- In the 2024 IBM Cost of a Data Breach report, organizations with faster incident detection (less than 200 days to identify/contain) reduce average breach cost by measurable amounts
- A 2024 Gartner report preview notes that organizations that adopt security awareness and web protection reduce phishing-related incidents by measurable margins in case studies (quantified in report)
- In the 2024 IBM Cost of a Data Breach report, the average time to contain a breach was 73 days (median time to contain).
- 29% of organizations use URL filtering solutions as part of their security stack (survey), helping reduce user navigation to malicious URLs
- In a 2023 industry survey, 34% of organizations used browser isolation/secure access methods to mitigate risky web content and malicious links
- A 2024 CISA advisory notes that URL shorteners can be abused for social engineering/phishing, and provides mitigation guidance for organizations
- A 2021 peer-reviewed study reported that character-level models using URL tokens reduced false positives while maintaining detection rates above 90% on public phishing URL datasets.
- PhishTank’s community feeds processed millions of URL submissions during 2023, reflecting high volumes of reported phishing URLs for reputation/labeling workflows.
- Virustotal reported that it analyzed tens of billions of URLs/files during 2023 through its public scanning services.
- In 2024, Google Safe Browsing prompted protections for users at scale, reporting that its removals and warnings cover hundreds of millions of potentially unsafe URLs.
- In the 2024 Cloud Security Alliance guidance, 2 out of 3 organizations reported that web application attacks are a key concern for cloud environments (survey result).
- In the 2024 UK Cyber Security Breaches Survey, 9% of businesses reported suffering ransomware (percentage experiencing this threat type).
Phishing dominates today’s breaches, but smarter URL filtering and faster detection measurably reduce impact and cost.
Related reading
Threat Landscape
Threat Landscape Interpretation
More related reading
Cost Analysis
Cost Analysis Interpretation
Security Controls
Security Controls Interpretation
More related reading
Detection Performance
Detection Performance Interpretation
More related reading
Operational Metrics
Operational Metrics Interpretation
Industry Adoption
Industry Adoption Interpretation
More related reading
Industry Trends
Industry Trends Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Diana Reeves. (2026, February 13). URL Statistics. Gitnux. https://gitnux.org/url-statistics
Diana Reeves. "URL Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/url-statistics.
Diana Reeves. 2026. "URL Statistics." Gitnux. https://gitnux.org/url-statistics.
References
- 1verizon.com/business/resources/reports/dbir/
- 2transparencyreport.google.com/safe-browsing/overview
- 18transparencyreport.google.com/safe-browsing
- 3ieeexplore.ieee.org/document/10155690
- 4dl.acm.org/doi/10.1145/3539015.3543957
- 15dl.acm.org/doi/10.1145/3459637.3472242
- 5proofpoint.com/us/resources/threat-report
- 6cloud.google.com/blog/topics/security/2023-security-report-phishing
- 7ncsc.gov.uk/report
- 8ibm.com/security/digital-assets/x-force-threat-intelligence-index
- 9ibm.com/reports/data-breach
- 11ibm.com/security/data-breach
- 10gartner.com/en/newsroom/press-releases/2024-10-15-gartner-security-technology-and-services-trends/
- 12gartner.com/en/newsroom/press-releases/2024-12-10-gartner-survey-shows-57-percent-of-enterprises-plan-to-implement-security-technology/
- 13gartner.com/en/newsroom/press-releases/2023-10-19-gartner-survey-shows-35-percent-of-organizations-plan-to-implement-browser-isolation-security/
- 14cisa.gov/news-events/alerts
- 16phishtank.org/stats.php
- 17blog.virustotal.com/2024/01/2023-year-in-review.html
- 19wombatsecurity.com/resources/anti-phishing-report
- 20cloudsecurityalliance.org/artifacts
- 21gov.uk/government/statistics/cyber-security-breaches-survey-2024
- 22enisa.europa.eu/publications/enisa-threat-landscape-2023







